First published: Sun Aug 10 2008(Updated: )
The CAPTCHA implementation in (1) Pligg 9.9.5 and possibly (2) Francisco Burzi PHP-Nuke 8.1 provides a critical random number (the ts_random value) within the URL in the SRC attribute of an IMG element, which allows remote attackers to pass the CAPTCHA test via a calculation that combines this value with the current date and the HTTP User-Agent string.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Php-Nuke | =8.1 | |
Pligg CMS | =9.9.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3573 is considered critical due to its ability to bypass CAPTCHA security mechanisms.
CVE-2008-3573 affects Pligg version 9.9.5 and PHP-Nuke version 8.1.
To fix CVE-2008-3573, update to the latest versions of Pligg and PHP-Nuke that address this vulnerability.
CVE-2008-3573 allows remote attackers to bypass CAPTCHA by exploiting vulnerabilities in the random number generation.
There are no documented workarounds for CVE-2008-3573; updating the software is the recommended action.